Millions of Android users open to attacks due to old versions of OS, FBI warns

Android has become a “primary” target for malware, and nearly half its users are open to attacks due to running old versions of the OS, according to an internal bulletin reportedly from the Department of Homeland Security and the FBI.

One in five adults have fallen victim to hackers – and one in 50 has lost more than $15,000, says British survey

One in five adults has fallen victim to hacks targeting their email accounts, social networking accounts or online bank accounts, according to a British survey conducted by the University of Kent.

How to keep children safe online (without looking over their shoulders all day)

Children come into contact with the internet at a very young age these days – a survey on a parenting site this year said that one in eight children go online before the age of two. Our tips will help keep youngsters safe – and help them enjoy the internet.

Cybercriminals use DDoS attacks as “smokescreens” for major cyber thefts

Millions of dollars have been lost to an “ominous” new hi-tech tactic used by cybercriminals – where a low-powered DDoS attack is used as “cover” for a direct assault on the bank’s payment system.

League of Legends players warned after major security breach

The popular online “battle arena” game League of Legends has suffered a major security breach which exposed account information for North American players, as well as transaction records from 2011 including salted and hashed credit card numbers.

Orbital Decay: the dark side of a popular file downloading tool

Orbit Downloader by Innoshock is a popular browser add-on often used to download embedded videos from sites such as YouTube. But the popular add-on has disturbing hidden functions.

New “anti-phishing” technology uses electronic cards, not passwords

Academics create new “anti-phishing” technology – electronic identity cards which allow secure access to websites, and which could simplify access for people less used to the Internet.

Avatar rootkit: the continuing saga

In this blog post we confirm that the Avatar rootkit continues to thrive in the wild, and disclose some new information about its kernel-mode self-defense tricks. We continue our research into this malware family.

Twitter hacker claims “no account is safe” – but network says not to worry

A hacker claims to have access to “the entire database of users on Twitter”, warning that “no account is safe”. He has leaked 15,000 account details via a file-sharing service as “proof” of his claims – although experts are skeptical.

U.S. Energy Dept admits to second big data leak this year

Personal information for 14,000 U.S. Department of Energy employees has leaked in a data breach, according to the Wall Street Journal. It’s the second major breach the Department has suffered this year.

LastPass owns up to password-exposing Internet Explorer bug

The bug allowed attackers to see any passwords using in a recent browsing session by performing a “memory dump”, and would have worked even if the user was not logged into LastPass.

Radar Love: how classic rock helps to highlight Java problems

Java has been – and still is – one of the more problematic issues security-wise. A website showing song lyrics from Golden Earring’s Radar Love shows off problems that can leave users at the mercy of Java attacks.

“Dr Jekyll” apps can sneak into App Store by hiding their dark side, researchers claim

Apps with a hidden “dark side” could sneak past Apple’s approval process, according to researchers at Georgia Tech. The researchers proved this theory using a malicious app which was approved and downloaded via App Store in March this year.

Dislike! No bounty for posting Facebook bug alert to Mark Zuckerberg’s wall

A security researcher demonstrated an exploit to Facebook by using the bug to post directly to Mark Zuckerberg’s Facebook wall. Facebook responded by issuing a statement saying he would not be paid.

“Constant attack from malicious apps”: Facebook purge goes wrong

An outage which affected Facebook apps and developer accounts this week was caused by over-zealous attempts to disable malicious apps, the social network has admitted.

Justin Bieber’s AMAZING diet: Five social posts you should never click

Most of us have faced cyber attacks sent by our best friends – Facebook “offers” they’ve clicked by accident, spamming everyone on their friends list, or Twitter stories they’ve shared without checking.

New York Post and SocialFlow are latest victims of Twitter hackers

The New York Post has become the latest victim of a prolific hacking campaign targeting the social media accounts of worldwide media outlets – and SocialFlow, a social media company used by the Post and other media outlets, has also fallen victim.

Hacker spies on and insults toddler in bed via baby monitor

A Texas family were horrified by an apparent hacker attack in which a criminal was able to spy on their two-year-old daughter and insult her through an internet-connected webcam.

Catch me if you can: Can we predict who will fall for phishing emails?

A new paper aims to profile the victims most likely to fall for a phishing attack. But what is less clear is how you develop a profile while avoiding the pitfalls of stereotyping.

Healthcare IT security: infographic stats point to big privacy holes

An infographic of recent healthcare IT security statistics paints a striking picture of much security work yet to be done, even as new medical privacy regulations go into effect.

Follow Us

Automatically receive new posts via email:

Delivered by FeedBurner

ESET Virus Radar


Select month
our experts

David Harley

Graham Cluley

Rob Waugh

Stephen Cobb

Olivier Bilodeau

Aryeh Goretsky

Lysa Myers

Benjamin Vanheuverzwijn

Pierre-Marc Bureau

Righard Zwienenberg

Robert Lipovsky

Guest Writer

Cameron Camp

Marc-Etienne M.Léveillé

Joan Calvet

Jean-Ian Boutin

Pablo Ramos

Andrew Lee

Sebastián Bortnik

Peter Stancik

Copyright © 2014 ESET, All Rights Reserved.